• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Input & output devices.

Extracts from this document...


Input & output devices Overlay Keyboards In many applications only a small number of different entries need to be made. It is faster to press a marked key than to enter a string of data. You are also less likely to make mistakes. The overlay keyboards works by having a membrane keyboard that has a number of areas/ keys on it. An overlay is put on top of the keyboard so that the user can select a specific for a particular entry. The computer is programmed to respond to each key in an appropriate manner. Touch Screens In some applications the concept keyboard application is replaced by a touch sensitive screen. The user touches the screen and the computer is programmed to respond in an appropriate way. One advantage of this method is that the program can change the screen layout at any time, and is possible to have several different menus (a bit like swapping the overlays on an overlay keyboard). These kind of terminals are used when the fast selection of information is important. ...read more.


The picture is thus made up of a string of 0's and 1's like 01101101110011010101100. This is in digital form. For a grey scale picture each dot may be one of several different shades of grey and this cannot be represented by just 0's and 1's is used to represent a shade. So for example 11111111= White 11111110= Light grey ............ 00000001= Dark grey 00000000= Black Using an 8-bit code like the one above gives us 256 different possible codes and so 256 possible shades of grey. For a colour picture a similar technique is used. Normally 3 different lights are shone on the picture and the reflected light from each is used to measure the colour value. Different colours are then represented using a collection of 0's and 1's as above. An 8-bit code will give us 256 colours. A 16 bit code will give us 65536 colours. Data capture Input methods that use a keyboard usually involve the transcription of the source data from the source document. This process clearly creates extra work, and if verification is employed to reduce errors made during transcription then the workload and the time taken is increased still further Documents readers are an automated method for putting data from the source document without the use of a keyboard. ...read more.


It is possible for documents typed on a normal typewriter or computer printer or even carefully hand printed documents to be read. The reliability of the reading depends on the clarity of the shape of the characters. The reader will expect a particular design of character (font) to be used. OCR is now quite common, and examples of OCR turnaround documents may be found on Gas and Electricity bills where the bill has figures printed on by the computer which can be read by OCR and enable the transfer of funds to take place. Advantages Disadvantages -Natural method for non-technical users -Cost of OCR readers -Data may be read by people -Not as reliable as OMR -Careful hand printing may be used Magnetic Ink Character Recognition (MICR) Here the characters are printed in special ink, which may be magnetised. Fonts used enable accurate reading of data. The typical example of this is it is used on bank cheques. Kimball tags Commonly used in fashion shops Bar Codes Commonly used in supermarkets Magnetic Strip Used for credit cards Voice Recognition Not yet good enough to become widely adopted Handwriting Recognition Progress being made on this but mainly used in specialist applications and with something other than normal handwriting e.g. PDAs. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. I will explain what the specifications are for an input and output device. I ...

    Main Storage: The main storage of the computer stores all of the data, which is going to be processed.

  2. WAN Devices

    A network that needs an external connection will include a router as this makes external access possible but Local Area Networks could use hubs, switches or bridges to connect parts of the network together. Gateways are also a possibility when connecting devices together that don't necessarily know how to interface with each other.

  1. Smart Card System

    The magnetic stripe works by encoding identification on a magnetic tape similar to how a computer writes information onto a floppy disk. This method is powerful but insure in many instances. These magnetic cards are easy to reproduce and there is no form of encryption. The Smart Card is different.

  2. Flexible Architectures in Communication Security Application

    Branch shows the effects of mispredictions, Issue shows the impact of reducing issue width. Mem shows the impact of introducing a realistic memory system, and Res gives the impact of limited functional unit resources.

  1. You need to discuss the advantages and disadvantages of someone in your

    What would happen when a folder gets lost? What are the problems with lots of filing cabinets in the office? What would happen if someone put a folder back in the wrong place? What would happen is someone spells something wrong?

  2. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    Internal modems are activated when you run a communications program and are turned off when you exit the program. This convenience is especially useful for novice users. These types of modems usually cost less. This is a diagram I have shown below of an internal modem.

  1. File transfer protocols

    Set_Up(Songs_Table); Process_Votes(Songs_Table, Total_Votes); Menu(Songs_Table, Total_Votes); End. (* Songs *) When this module has been tested to our satisfaction, we can then move on and code the next module in turn i.e. Set_Up. Program Songs(Input, Output); Type Strings20 = Packed Array(1..20] of Char; String20 = Packed Array(1.

  2. According to John Searle, strong analytical devices that have Artificial Intelligence can, at most, ...

    A third batch of Chinese symbols and more instructions in English enable you "to correlate elements of this third batch with elements of the first two batches" and instruct you, thereby, "to give back certain sorts of Chinese symbols with certain sorts of shapes in response."

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work